{"id":37991,"date":"2021-10-04T11:36:00","date_gmt":"2021-10-04T18:36:00","guid":{"rendered":"https:\/\/developer.nvidia.com\/blog\/?p=37991"},"modified":"2023-07-11T16:11:46","modified_gmt":"2023-07-11T23:11:46","slug":"edge-computing-considerations-for-security-architects","status":"publish","type":"post","link":"https:\/\/developer.nvidia.com\/blog\/edge-computing-considerations-for-security-architects\/","title":{"rendered":"Edge Computing: Considerations for Security Architects"},"content":{"rendered":"\n<p>Data is increasingly being generated at remote edge locations out of reach from traditional data center solutions. To take advantage of these sources of data, companies adopt <a href=\"https:\/\/blogs.nvidia.com\/blog\/2019\/10\/22\/what-is-edge-computing\/\">edge computing <\/a>by moving computing power and storage closer to where the data is collected. This decreases bandwidth costs and latency when streaming data back to a data center or cloud. Edge computing delivers applications to customers and employees in a more cost-effective way. While there are many benefits to deploying applications at the edge, edge devices create potential entry points for cybersecurity threats not seen in a traditional data center model, such as DDoS attacks or endpoint malware.<\/p>\n\n\n\n<p>As critical infrastructure such as healthcare, robotic manufacturing, utilities, and telecommunications increasingly incorporate AI-capable devices, edge security becomes a serious concern for society. Edge AI systems are vulnerable. They contain valuable IP and private user data that can be stolen, commandeered for other applications such as bitcoin mining and DDoS attacks, or used to manipulate critical infrastructure. Operators of edge computing have a responsibility to secure endpoints, networks, and data.<\/p>\n\n\n\n<p>As a leader in AI computing, NVIDIA is bringing expertise to the forefront and helping customers understand how to protect valuable AI models and applications when deploying at the edge.&nbsp;<\/p>\n\n\n\n<p>To understand the new approach to edge security, it\u2019s important to compare it to the traditional security models that have been implemented in the data center.<\/p>\n\n\n\n<h2 id=\"data_center_security\"  class=\"wp-block-heading\">Data Center Security<a href=\"#data_center_security\" class=\"heading-anchor-link\"><i class=\"fas fa-link\"><\/i><\/a><\/h2>\n\n\n\n<p>There are two initial layers of security applied in the data center\u2014physical security and secure control over the logical network. When operating a data center, colocation, or cloud there must be a perimeter that is well-defined and controlled. Organizations have strict policies that determine who can enter the data center, ensuring no one is able to get physical access or tamper with systems.&nbsp;<\/p>\n\n\n\n<p>With physical security locked down, organizations set up network controls that restrict who can connect to the data center, even limiting those on the company VPN. Companies use ephemeral jump boxes, which narrow access to the data center, leveraging keys that uniquely identify users. Network controls in the data center further limit which employees have the right to change systems and include robust logging tools ensuring all changes are recorded for audit and security responses.<\/p>\n\n\n\n<h2 id=\"edge_computing_security\"  class=\"wp-block-heading\">Edge Computing Security<a href=\"#edge_computing_security\" class=\"heading-anchor-link\"><i class=\"fas fa-link\"><\/i><\/a><\/h2>\n\n\n\n<h3 id=\"physical_security\"  class=\"wp-block-heading\">Physical Security<a href=\"#physical_security\" class=\"heading-anchor-link\"><i class=\"fas fa-link\"><\/i><\/a><\/h3>\n\n\n\n<p>With edge computing sites, these security norms are flipped on their head. When designing a secure edge computing solution, organizations have to make the assumption that a malicious person could get physical access to a machine if they wanted to. For example, an edge system at a supermarket or a big-box store is often in the store manager\u2019s office or IT closet. Much of the time, this location may not be locked and almost anyone can get to the server.<\/p>\n\n\n\n<p>This means someone could steal the machine and take it off-site to extract sensitive data, patch the operating system in a malicious way, or even change system drivers. To counter these physical threats, stored data at the edge is encrypted and the hard drive partitioned so the boot partition is made immutable and can\u2019t easily be rewritten or changed.<\/p>\n\n\n\n<p>The physical system can be equipped with physical tamper detection. A Trusted Platform Module (TPM) on the system can be used to ensure secure and measured boot. This means that the firmware and kernel-mode software is checked when the system boots and it will only load if it\u2019s signed, demonstrating that it came from a trusted source. Solutions that have signed containers add additional security checks to ensure that running applications have not been tampered with.<\/p>\n\n\n\n<h3 id=\"zero_trust_networking\"  class=\"wp-block-heading\">Zero Trust Networking<a href=\"#zero_trust_networking\" class=\"heading-anchor-link\"><i class=\"fas fa-link\"><\/i><\/a><\/h3>\n\n\n\n<p>Another challenge to consider when deploying AI applications at remote locations is the network. Traditional network security is based on a concept known as castle-and-moat, where it&#8217;s difficult to connect from the outside, but there&#8217;s default trust with everyone in the network. For obvious reasons, this model breaks down at the edge where \u201ctrusted\u201d devices can be located anywhere.<\/p>\n\n\n\n<p>Zero Trust networking assumes no trust, even for those in the network. Instead, any access points on the network are assigned a trust policy for who, what, when, where, why, and how for the limited time needed to accomplish a specific task.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure data-wp-context=\"{&quot;imageId&quot;:&quot;69efd6c7ed92d&quot;}\" data-wp-interactive=\"core\/image\" class=\"aligncenter wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/lh4.googleusercontent.com\/XXZy1mMXVxM147Ic2o_0wdhOITIoBAeJRsMJP6H03BdCk5s7H9SfGJnDDK6MB3V8tuR-idhyYP2xEsJD75m5Qqd69Dpo9Ae3a0w7VBoxp9zoR1N7GsteP5qZbsRPJ0uRlCPAHgS9=s0\" alt=\"\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption><em>Figure 1. When implementing a zero-trust policy, anything in or outside of an organization&#8217;s perimeters must be verified before receiving access.<\/em><\/figcaption><\/figure><\/div>\n\n\n\n<p>With remote management of edge systems, companies can now leverage access controls to ensure the right people have visibility to the system.&nbsp;<\/p>\n\n\n\n<p>Going back to the supermarket example, typically an IT that manages the overall edge computing infrastructure decides which users have access. In this scenario, organizations can set up least privileged policies so that a user is given the least amount to do their job. This could mean some users have access to see what\u2019s going on and view alerts, but not to make changes.<\/p>\n\n\n\n<p>Alternatively, other users have access to deploy and manage AI applications at the edge without being able to manage the physical systems themselves. In some instances, third-party application vendors may be given access to manage applications at edge locations. Unlike a traditional data center, there may be more people who are responsible for the applications running at the edge requiring IT to create specific trust policies that limit tampering or malicious behavior.&nbsp;<\/p>\n\n\n\n<h3 id=\"edge_ai_security&nbsp;\"  class=\"wp-block-heading\">Edge AI Security&nbsp;<a href=\"#edge_ai_security&nbsp;\" class=\"heading-anchor-link\"><i class=\"fas fa-link\"><\/i><\/a><\/h3>\n\n\n\n<p>As more AI applications are deployed at edge locations, organizations need to ensure that the security policies put in place take into consideration the changes remote environments bring.&nbsp;<\/p>\n\n\n\n<p>NVIDIA has a robust security team that is continually investing in the best security standards for accelerated computing.&nbsp;<\/p>\n\n\n\n<p>Other areas NVIDIA is focused on to help with edge computing security include:<\/p>\n\n\n\n<p><strong>AI model protection: <\/strong>AI models are expensive to create, and tailor to specific environments. So the owners want assurances that those models are protected at rest, in transit, and in use. To help protect these unique workloads,&nbsp; <a href=\"https:\/\/www.mitre.org\/publications\/project-stories\/mitre-microsoft-others-take-on-machine-learning-threats\">NVIDIA has partnered with Mitre, Microsoft, and 10 other organizations to take on machine learning threats<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>Edge node security:<\/strong> Due to the lack of physical security for most edge computing systems, software techniques rooted in hardware security features like a secure and measured boot, remote attestation, and drive encryption are critical components of edge computing security.<\/p>\n\n\n\n<p><strong>Distributed device management: <\/strong>When deploying edge systems at hundreds, or even thousands of locations, centralized management with granular access controls is critical for any edge security model.<\/p>\n\n\n\n<p><strong>Edge to cloud connection security:<\/strong> A secure provisioning process to add new nodes at locations at the edge ensures that only systems with administrator approval are added. Additionally, setting rules for communication between nodes at the edge and the cloud management platform protects and isolates data.&nbsp;<\/p>\n\n\n\n<p><strong>Distributed analytics security: <\/strong>For AI models that use multiple connected systems for analytics, ensuring authenticated and encrypted communication between those systems adds an important additional layer of security, especially for organizations collecting and analyzing sensitive or regulated data.&nbsp;<\/p>\n\n\n\n<p>To stay up to date with the latest security considerations for edge computing be sure to subscribe to <a href=\"https:\/\/nvda.ws\/2Wqx6QP\">NVIDIA edge computing news<\/a>. For those looking to learn more about other considerations when deploying edge computing, register for the <a href=\"https:\/\/www.nvidia.com\/en-us\/data-center\/edge-computing\/edge-ai\/technical-overview\/\">Top Considerations for Deploying AI at the Edge whitepaper.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about considerations organizations must take to secure AI models at the edge when incorporating edge computing into their strategy.<\/p>\n","protected":false},"author":1241,"featured_media":38076,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"publish_to_discourse":"","publish_post_category":"318","wpdc_auto_publish_overridden":"","wpdc_topic_tags":"","wpdc_pin_topic":"","wpdc_pin_until":"","discourse_post_id":"824118","discourse_permalink":"https:\/\/forums.developer.nvidia.com\/t\/edge-computing-considerations-for-security-architects\/191184","wpdc_publishing_response":"success","wpdc_publishing_error":"","nv_subtitle":"","ai_post_summary":"<ul><li>Edge computing involves moving computing power and storage closer to where data is collected, reducing bandwidth costs and latency, but also creates potential entry points for cybersecurity threats.<\/li><li>To secure edge computing, organizations must assume that malicious individuals could gain physical access to edge systems, and use measures such as encrypting stored data, making the boot partition immutable, and using Trusted Platform Modules (TPMs) for secure boot.<\/li><li>NVIDIA is helping customers protect their AI models and applications at the edge by focusing on areas such as AI model protection, edge node security, and distributed device management, and has partnered with organizations like Mitre and Microsoft to address machine learning threats.<\/li><\/ul>","footnotes":"","_links_to":"","_links_to_target":""},"categories":[852],"tags":[453,1472,1958,1970,1511,2541],"coauthors":[2540],"class_list":["post-37991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-center-cloud","tag-featured","tag-metropolis","tag-news","tag-retail-etail","tag-security-ai","tag-zero-trust","tagify_workload-data-center-cloud","tagify_workload-edge-computing","tagify_workload-networking-communications","tagify_workload-cybersecurity"],"acf":{"post_industry":["Retail \/ Consumer Packaged Goods"],"post_products":["Metropolis"],"post_learning_levels":[],"post_content_types":["News"],"post_collections":[]},"jetpack_featured_media_url":"https:\/\/developer-blogs.nvidia.com\/wp-content\/uploads\/2021\/09\/image3-4.png","primary_category":{"category":"Data Center \/ Cloud","link":"https:\/\/developer.nvidia.com\/blog\/category\/data-center-cloud\/","id":852,"data_source":""},"nv_translations":[{"language":"zh_CN","title":"\u8fb9\u7f18\u8ba1\u7b97\uff1a\u5b89\u5168\u67b6\u6784\u5e08\u7684\u8003\u8651\u4e8b\u9879","post_id":1853}],"jetpack_shortlink":"https:\/\/wp.me\/pcCQAL-9SL","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/posts\/37991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/users\/1241"}],"replies":[{"embeddable":true,"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/comments?post=37991"}],"version-history":[{"count":5,"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/posts\/37991\/revisions"}],"predecessor-version":[{"id":38055,"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/posts\/37991\/revisions\/38055"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/media\/38076"}],"wp:attachment":[{"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/media?parent=37991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/categories?post=37991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/tags?post=37991"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/developer-blogs.nvidia.com\/wp-json\/wp\/v2\/coauthors?post=37991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}